Cyber Posture

CVE-2025-60425

High

Published: 27 October 2025

Published
27 October 2025
Modified
05 November 2025
KEV Added
Patch
CVSS Score 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
EPSS Score 0.0151 81.3th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries can use stolen session cookies to authenticate to web applications and services.

Security Summary

CVE-2025-60425 affects Nagios Fusion versions v2024R1.2 and v2024R2, where the software fails to invalidate existing session tokens upon enabling the two-factor authentication (2FA) mechanism. This flaw, classified under CWE-491 (Masking of a Critical Element), enables session hijacking attacks and carries a CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L), indicating high severity due to its network accessibility, low attack complexity, and lack of prerequisites like privileges or user interaction.

Unauthenticated attackers can exploit this vulnerability remotely by obtaining a valid session token prior to 2FA enablement—such as through phishing, malware, or prior unauthorized access—and reusing it post-2FA activation to hijack the victim's session. Successful exploitation grants attackers high integrity impact (I:H), allowing unauthorized actions like configuration changes or data manipulation under the victim's privileges, alongside low confidentiality (C:L) and availability (A:L) impacts.

Advisories and mitigation details are available in the provided references, including the Nagios changelog at https://www.nagios.com/changelog/#fusion for patch information and GitHub repositories https://github.com/aakashtyal/Session-Persistence-After-Enabling-2FA and https://github.com/aakashtyal/Session-Persistence-After-Enabling-2FA-CVE-2025-60425 for technical analysis and proof-of-concept. Security practitioners should review these for upgrade guidance and apply patches promptly.

Details

CWE(s)
CWE-491

Affected Products

nagios
fusion
2024

MITRE ATT&CK Enterprise Techniques

T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
T1550.004 Web Session Cookie Lateral Movement
Adversaries can use stolen session cookies to authenticate to web applications and services.
Why these techniques?

The vulnerability fails to invalidate session tokens upon enabling 2FA, enabling browser session hijacking (T1185) and continued use of stolen web session cookies as alternate authentication material (T1550.004) for unauthorized access and privilege escalation.

References